Sciweavers

3792 search results - page 695 / 759
» Techniques for Trusted Software Engineering
Sort
View
97
Voted
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
15 years 5 months ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
120
Voted
SIGCSE
2008
ACM
143views Education» more  SIGCSE 2008»
15 years 13 days ago
Test-driven learning in early programming courses
Coercing new programmers to adopt disciplined development practices such as thorough unit testing is a challenging endeavor. Test-driven development (TDD) has been proposed as a s...
David Janzen, Hossein Saiedian
119
Voted
SAC
2010
ACM
14 years 10 months ago
A machine-checked soundness proof for an efficient verification condition generator
Verification conditions (VCs) are logical formulae whose validity implies the correctness of a program with respect to a specification. The technique of checking software properti...
Frédéric Vogels, Bart Jacobs 0002, F...
ICDE
2002
IEEE
161views Database» more  ICDE 2002»
16 years 1 months ago
Design and Implementation of a High-Performance Distributed Web Crawler
Broad web search engines as well as many more specialized search tools rely on web crawlers to acquire large collections of pages for indexing and analysis. Such a web crawler may...
Vladislav Shkapenyuk, Torsten Suel
ICDE
1999
IEEE
143views Database» more  ICDE 1999»
16 years 1 months ago
Query Routing in Large-Scale Digital Library Systems
Modern digital libraries require user-friendly and yet responsive access to the rapidly growing, heterogeneous, and distributed collection of information sources. However, the inc...
Ling Liu